Newest Listing

Top Rated

Most Popular

Forensics TrainingRSS

Computer Forensics Training

 

A very hot topic these days with a multitude of meanings.  For some computer forensics are imaging a host in a manner that will stand up in a court of law, the image alone is then analyzed for evidence that could be used for prosecution.  When selecting a course ensure that you fully understand what you hope to achieve and that the course will fulfil those requirements. For some forensics is identifying what has occurred on the host/network without worrying too much about the preservation of evidence iaw the laws of the Country concerned.

CFIP Certified Forensic Investigation Practitioner

Visit the Product Site

3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...

Vendor7Safe
Pricing ModelCommercial
Modified

Visit the Product Site

This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...

VendorSANS
Pricing ModelCommercial
Modified

Visit the Product Site

The Certified Digital Forensics Examiner program is designed to train Cyber Crime Investigators. Students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while con ...

VendorMile2
Pricing ModelCommercial
Modified

Visit the Product Site

This course will put you through the paces in Linux as it stands itself (the operating system), and then move you into Linux and Data Forensics. The idea here is to take someone new to Linux and get them up and running with enough knowledge and hands on e ...

VendorCrazytrain
ModifiedNever

Visit the Product Site

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

VendorCrazytrain
ModifiedNever

Visit the Product Site

The course is ideal for individuals who conduct computer security reviews, computer based internal audits and computer related investigations. The participants in this course typically are employed by government agencies, law enforcement agencies, Fortune ...

VendorNew Technologies Inc
ModifiedNever

Visit the Product Site

This course provides the participants with "hands-on" experience in developing and presenting computer evidence testimony in a courtroom setting. It relies upon the sanitized facts and evidence in an actual civil litigation case which involved the theft o ...

VendorNew Technologies Inc
ModifiedNever

Visit the Product Site

RAC Information Security Training Centre offers a standard set of computer forensic training courses. We offer, as an extension to our standard set of training courses, "Hot-spot workshops" based on your relevant problems. These workshops are oriented to ...

VendorRisk Analysis Consultants
ModifiedNever

Visit the Product Site

Computer Forensics Core Competencies 5day This computer forensics training is meant for those without any previous experience with computer forensics. The student will be introduced to concepts and techniques that every computer forensics practitioner mu ...

VendorSP Hailey Enterprises
ModifiedNever

Visit the Product Site

The program is designed to be about 70% hands-on and will give you plenty of time to practice and learn the skills necessary to conduct forensic examinations. There are a maximum of 9 students per instructor, so there will be plenty of individual instruct ...

VendorKey Computer Service, Inc.
ModifiedNever

Visit the Product Site

The Enterprise Intrusion Analysis course provides students with the skills needed to discover and analyze enterprise intrusions in a UNIX environment. Upon completion of this course, students should be able to: * 1. Detect an enterprise system i ...

VendorOracle
Pricing ModelCommercial
Modified

Visit the Product Site

The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...

VendorSANS
Pricing ModelCommercial
Modified

Visit the Product Site

Computer-based evidence is widely accepted in courts of law and is increasingly a mainstay of success--even where the crime or dispute in question is not "high-tech." SANS has worked hard to train forensic analysts and investigators to acquire, process, a ...

VendorSANS
Pricing ModelCommercial
Modified

Visit the Product Site

The Certified Computer Examiner (CCE) certification is a challenging test of the knowledge required to work in computer forensics, involving an on-line proctored exam and a thorough practical component involving correct investigation of several physical i ...

VendorIntense School
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

What Will You Learn? This course will give you an in-depth study of the computer forensics process. Starting from creating evidentiary disk images to recognizing the often-faint trail of unauthorized activity, Foundstone updates this class continuously by ...

VendorMcAfee
Pricing ModelCommercial
Modified

Visit the Product Site

Finally, a  Forensics class that teaches hands-on Tactical Forensics skills with validating  practical labs. This class is for students who want a comprehensive understanding of Forensic Examination and not just concepts of investigations. ...

VendorSecurity University
Pricing ModelCommercial
Modified

Visit the Product Site

The Digital Forensics concentration combines core computer science concepts with an in-depth, technical study of digital forensics. The curriculum is highly system-oriented, where students gain deep insights into how operating systems, networks, and compu ...

VendorJames Madison University
Pricing ModelCommercial
Modified

Visit the Product Site

FOR572: Advanced Network Forensics and Analysis, was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. It focuses on the knowledge necessary to expand the forensic min ...

VendorSANS
Pricing ModelCommercial
Modified

Visit the Product Site

This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that ...

VendorSANS
Pricing ModelCommercial
Modified